Works matching DE "DATABASE security"
Results: 304
Enhancing Design and Authentication Performance Model: A Multilevel Secure Database Management System.
- Published in:
- Future Internet, 2025, v. 17, n. 2, p. 74, doi. 10.3390/fi17020074
- By:
- Publication type:
- Article
Privacy of health data needs stronger protection in emerging systems.
- Published in:
- Public Health Reports, 1994, v. 109, n. 5, p. 718
- Publication type:
- Article
Improving patient centric data retrieval and cyber security in healthcare: privacy preserving solutions for a secure future.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 27, p. 70289, doi. 10.1007/s11042-024-18253-5
- By:
- Publication type:
- Article
Retraction Note: The resin lens flaw feature extraction and detection system based on data transmission security.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
Database Steganography: Hiding Complete Database In Another Database.
- Published in:
- Al-Yarmouk Journal, 2018, v. 10, n. 10, p. 1
- By:
- Publication type:
- Article
The Backstory of "An Adversarial Dance".
- Published in:
- Journal of the Association for Information Systems, 2023, v. 24, n. 2, p. 336, doi. 10.17705/1jais.00804
- By:
- Publication type:
- Article
Application of the Polynomial Function in the Analysis of Statistical Indicators of Risk and Safety in Shipping.
- Published in:
- Scientific Journal of Maritime Research, 2023, v. 37, n. 1, p. 16, doi. 10.31217/p.37.1.2
- By:
- Publication type:
- Article
Vulnerability Disclosure in a Cloud-centric World.
- Published in:
- ISSA Journal, 2022, v. 20, n. 5, p. 8
- By:
- Publication type:
- Article
Zeroing on Zero Trust Architecture.
- Published in:
- ISSA Journal, 2022, v. 20, n. 2, p. 13
- By:
- Publication type:
- Article
Zeroing in on Zero Trust Architecture.
- Published in:
- ISSA Journal, 2021, v. 19, n. 12, p. 8
- By:
- Publication type:
- Article
Let’s Retire the Term ‘Threat Modeling’.
- Published in:
- ISSA Journal, 2021, v. 19, n. 8, p. 7
- By:
- Publication type:
- Article
Basic Principles of Database Security.
- Published in:
- ISSA Journal, 2019, v. 17, n. 4, p. 22
- By:
- Publication type:
- Article
Cryptocurrency and Corporate Security.
- Published in:
- ISSA Journal, 2018, v. 16, n. 8, p. 10
- By:
- Publication type:
- Article
Description and Analysis of Data Security Based on Differential Privacy in Enterprise Power Systems.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 23, p. 4829, doi. 10.3390/math11234829
- By:
- Publication type:
- Article
A guiding framework for enhancing database security in state-owned universities in Zimbabwe.
- Published in:
- African Journal of Science, Technology, Innovation & Development, 2022, v. 14, n. 7, p. 1761, doi. 10.1080/20421338.2021.1984010
- By:
- Publication type:
- Article
EXAMINING THE MODERATING EFFECT OF RISK ATTENUATION ON THE RELATIONSHIP BETWEEN INVESTOR SENTIMENT AND CASH FLOW VOLATILITY.
- Published in:
- Annals of the Constantin Brancusi University of Targu Jiu-Letters & Social Sciences Series, 2024, n. 2, p. 113
- By:
- Publication type:
- Article
Simulation of Cryptographic Algorithms in IPSec on Ad-Hoc Networks.
- Published in:
- Journal of King Abdulaziz University: Engineering Sciences, 2017, v. 28, n. 1, p. 31, doi. 10.4197/Eng.28-1.3
- By:
- Publication type:
- Article
A Survey of Access Control and Data Encryption for Database Security.
- Published in:
- Journal of King Abdulaziz University: Engineering Sciences, 2017, v. 28, n. 1, p. 19, doi. 10.4197/Eng.28-1.2
- By:
- Publication type:
- Article
Developing an MQ-LSTM-Based Cultural Tourism Accelerator with Database Security.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 23, p. 16276, doi. 10.3390/su152316276
- By:
- Publication type:
- Article
Climate Change, Farm Irrigation Facilities, and Agriculture Total Factor Productivity: Evidence from China.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 4, p. 2889, doi. 10.3390/su15042889
- By:
- Publication type:
- Article
Implement of production management system of finishing workshop based on multi-Agent.
- Published in:
- Wool Textile Journal, 2010, v. 38, n. 9, p. 49
- By:
- Publication type:
- Article
THE SECURITY OF TEXT DATA BASED ON CYCLIC CODES OVER ALGEBRAIC STRUCTURE.
- Published in:
- Thermal Science, 2024, v. 28, n. 6B, p. 5205, doi. 10.2298/TSCI2406205B
- By:
- Publication type:
- Article
SQL Injection-Database Attack Revolution and Prevention.
- Published in:
- Journal of International Commercial Law & Technology, 2011, v. 6, n. 4, p. 224
- By:
- Publication type:
- Article
Securing a service-oriented architecture (SOA) environment.
- Published in:
- Journal of Business Continuity & Emergency Planning, 2007, v. 1, n. 2, p. 129, doi. 10.69554/ltfs6880
- By:
- Publication type:
- Article
Potential of blockchain approach on development and security of microbial databases.
- Published in:
- Biological Procedures Online, 2021, v. 23, n. 1, p. 1, doi. 10.1186/s12575-020-00139-z
- By:
- Publication type:
- Article
Applying QVT in Order to Implement Secure Data Warehouses in SQL Server Analysis Services.
- Published in:
- Journal of Research & Practice in Information Technology, 2009, v. 41, n. 2, p. 135
- By:
- Publication type:
- Article
The Uncommon Information Commons.
- Published in:
- Bio-IT World, 2006, v. 5, n. 6, p. 31
- By:
- Publication type:
- Article
BRIEFS.
- Published in:
- Bio-IT World, 2003, v. 2, n. 9, p. 18
- Publication type:
- Article
DNA databases shut after identities compromised.
- Published in:
- Nature, 2008, v. 455, n. 7209, p. 13, doi. 10.1038/455013a
- Publication type:
- Article
Privacy Protection of Binary Confidential Data Against Deterministic, Stochastic, and Insider Threat.
- Published in:
- Management Science, 2002, v. 48, n. 6, p. 749, doi. 10.1287/mnsc.48.6.749.193
- By:
- Publication type:
- Article
A General Additive Data Perturbation Method for Database Security.
- Published in:
- Management Science, 1999, v. 45, n. 10, p. 1399, doi. 10.1287/mnsc.45.10.1399
- By:
- Publication type:
- Article
Accessibility, Security, and Accuracy in Statistical Databases: The Case for the Multiplicative Fixed Data Perturbation Approach.
- Published in:
- Management Science, 1995, v. 41, n. 9, p. 1549, doi. 10.1287/mnsc.41.9.1549
- By:
- Publication type:
- Article
Understanding Data Forensics.
- Published in:
- Bank Accounting & Finance (08943958), 2006, v. 19, n. 6, p. 36
- By:
- Publication type:
- Article
Onset of new business? Private military and security companies and conflict onset in Latin America, Africa, and Southeast Asia from 1990 to 2011.
- Published in:
- Small Wars & Insurgencies, 2021, v. 32, n. 8, p. 1362, doi. 10.1080/09592318.2020.1866404
- By:
- Publication type:
- Article
Problems of database protection in the Russian Federation.
- Published in:
- Information & Communications Technology Law, 2012, v. 21, n. 1, p. 19, doi. 10.1080/13600834.2012.642613
- By:
- Publication type:
- Article
Strengthening the United States' Database Protection Laws: Balancing Public Access and Private Control.
- Published in:
- Science & Engineering Ethics, 2003, v. 9, n. 3, p. 301, doi. 10.1007/s11948-003-0027-8
- By:
- Publication type:
- Article
Grid and Data Analyzing and Security.
- Published in:
- Database Systems Journal, 2012, v. 3, n. 4, p. 61
- By:
- Publication type:
- Article
Frame Structure and Engineering Applications of the Multisource System Cloud Service Platform of Monitoring of the Soft Rock Tunnel.
- Published in:
- Geofluids, 2021, p. 1, doi. 10.1155/2021/6672732
- By:
- Publication type:
- Article
Advancing database security: a comprehensive systematic mapping study of potential challenges.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 7, p. 6399, doi. 10.1007/s11276-023-03436-z
- By:
- Publication type:
- Article
Secure shortest distance queries over encrypted graph in cloud computing.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 4, p. 2633, doi. 10.1007/s11276-024-03692-7
- By:
- Publication type:
- Article
Enhanced Elman spike neural network based fractional order discrete Tchebyshev encryption fostered big data analytical method for enhancing cloud data security.
- Published in:
- Wireless Networks (10220038), 2023, v. 29, n. 2, p. 523, doi. 10.1007/s11276-022-03142-2
- By:
- Publication type:
- Article
Retracted: Image Data Security Mechanism Based on the Internet of Things Cardiac Catheterization Laboratory Information Management System Research and Design.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
INFRASTRUCTURE FOR RBAC-MAS: AN APPROACH BASED ON AGENT COORDINATION CONTEXTS.
- Published in:
- Applied Artificial Intelligence, 2007, v. 21, n. 4-5, p. 443, doi. 10.1080/08839510701253674
- By:
- Publication type:
- Article
Encryption Algorithms for Data Transmission Security in Industrial Environments.
- Published in:
- Petroleum - Gas University of Ploiesti Bulletin, Technical Series, 2016, v. 68, n. 4, p. 27
- By:
- Publication type:
- Article
A new comparative study of database security.
- Published in:
- Romanian Journal of Information Technology & Automatic Control / Revista Română de Informatică și Automatică, 2023, v. 33, n. 3, p. 17, doi. 10.33436/v33i3y202302
- By:
- Publication type:
- Article
Underestimating attacks: comparing two sources of publicly-available data about attacks on health care in 2017.
- Published in:
- Conflict & Health, 2023, v. 17, n. 1, p. 1, doi. 10.1186/s13031-023-00498-w
- By:
- Publication type:
- Article
Construction of a Security Vulnerability Identification System Based on Machine Learning.
- Published in:
- Journal of Sensors, 2020, p. 1, doi. 10.1155/2020/7358692
- By:
- Publication type:
- Article
Database Secure Manipulation based on Paillier's Homomorphic Encryption (DSM-PHE).
- Published in:
- International Journal of Interactive Mobile Technologies, 2019, v. 13, n. 12, p. 136, doi. 10.3991/ijim.v13i12.11396
- By:
- Publication type:
- Article
E-Discovery: Identifying and Mitigating Security Risks during Litigation.
- Published in:
- IT Professional, 2008, v. 10, n. 4, p. 20, doi. 10.1109/MITP.2008.67
- By:
- Publication type:
- Article
Implementing Database Security and Auditing.
- Published in:
- 2006
- Publication type:
- Book Review